Data coypright management method
First Claim
1. A data copyright management method used for producing new data by editing original data, the method comprising the steps of:
- a database supplies a plurality of original data encrypted respectively by using each first secret-key thereof, to a primary user;
said primary user makes a request for use to a copyright management center by presenting a public-key of said primary user;
said copyright management center sends said first secret-key of each of said original data and a second secret-key of each said original data to said primary user;
said primary user decrypts said plurality of original data encrypted, by using said first secret-key of each said original data;
said primary user produces new data which is produced from a plurality of edited data by editing said plurality of original data using an edit program;
said primary user encrypts said plurality of edited data respectively by said second secret-key of each said original data and performs a digital signature on editing process data of said edit program by using a private-key of said primary user, and supplies both said plurality of edited data and said editing process data with said digital signature to a secondary user;
said secondary user requests use of said new data by presenting said editing process data with said digital signature to said copyright management center;
said copyright management center confirms an editor as said primary user from said digital signature using said public-key of said primary user, and provides said secondary user with said second secret-key of each said original data; and
said secondary user decrypts said plurality of edited data which have been encrypted, respectively by using said second secret-key of each said original data, and obtains said new data using said edit program and said editing process data.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a process for managing data copyright in the case when a primary user produces new data by editing a plurality of original data and supplies the new data to a secondary user. A public-key and a private-key of the primary user, and a first secret-key and a second secret-key of the original data, each of which is controlled by a copyright management center, and an edit program are used. The primary user, who is supplied a plurality of original data encrypted by each first secret-key thereof, decrypts the plurality of original data by each of the secret-keys and produces new data using the edit program. The primary user re-encrypts the new data by the second secret-key of each original data, respectively. The re-encrypted data is supplied to the secondary-user, together with editing process data which includes a digital signature generated using the private-key. The secondary user presents the editing process data with the digital signature to a copyright management center. The copyright management center confirms that the digital signature is of the primary user, and then, transmits the second secret-key for the respective original data. In the present data copyright management process, it is possible that the secondary user edits again the data which has been edited, by using the second secret-key in place of the first secret-key and using a third secret-key in place of the second secret-key.
-
Citations
24 Claims
-
1. A data copyright management method used for producing new data by editing original data, the method comprising the steps of:
-
a database supplies a plurality of original data encrypted respectively by using each first secret-key thereof, to a primary user; said primary user makes a request for use to a copyright management center by presenting a public-key of said primary user; said copyright management center sends said first secret-key of each of said original data and a second secret-key of each said original data to said primary user; said primary user decrypts said plurality of original data encrypted, by using said first secret-key of each said original data; said primary user produces new data which is produced from a plurality of edited data by editing said plurality of original data using an edit program; said primary user encrypts said plurality of edited data respectively by said second secret-key of each said original data and performs a digital signature on editing process data of said edit program by using a private-key of said primary user, and supplies both said plurality of edited data and said editing process data with said digital signature to a secondary user; said secondary user requests use of said new data by presenting said editing process data with said digital signature to said copyright management center; said copyright management center confirms an editor as said primary user from said digital signature using said public-key of said primary user, and provides said secondary user with said second secret-key of each said original data; and said secondary user decrypts said plurality of edited data which have been encrypted, respectively by using said second secret-key of each said original data, and obtains said new data using said edit program and said editing process data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification